// SPDX-License-Identifier: GPL-2.0-or-later /* PASST - Plug A Simple Socket Transport * for qemu/UNIX domain socket mode * * PASTA - Pack A Subtle Tap Abstraction * for network namespace/tap device mode * * tap.c - Functions to communicate with guest- or namespace-facing interface * * Copyright (c) 2020-2021 Red Hat GmbH * Author: Stefano Brivio * */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "checksum.h" #include "util.h" #include "ip.h" #include "iov.h" #include "passt.h" #include "arp.h" #include "dhcp.h" #include "ndp.h" #include "dhcpv6.h" #include "pcap.h" #include "netlink.h" #include "pasta.h" #include "packet.h" #include "tap.h" #include "log.h" /* IPv4 (plus ARP) and IPv6 message batches from tap/guest to IP handlers */ static PACKET_POOL_NOINIT(pool_tap4, TAP_MSGS, pkt_buf); static PACKET_POOL_NOINIT(pool_tap6, TAP_MSGS, pkt_buf); /* Filled buffers on the tap device */ static bool tap_full_flag; #define TAP_SEQS 128 /* Different L4 tuples in one batch */ #define FRAGMENT_MSG_RATE 10 /* # seconds between fragment warnings */ /** * tap_send_single() - Send a single frame * @c: Execution context * @data: Packet buffer * @l2len: Total L2 packet length */ void tap_send_single(const struct ctx *c, const void *data, size_t l2len) { uint32_t vnet_len = htonl(l2len); struct iovec iov[2]; size_t iovcnt = 0; if (c->mode == MODE_PASST) { iov[iovcnt] = IOV_OF_LVALUE(vnet_len); iovcnt++; } iov[iovcnt].iov_base = (void *)data; iov[iovcnt].iov_len = l2len; iovcnt++; tap_send_frames(c, iov, iovcnt, 1); } /** * tap_ip6_daddr() - Normal IPv6 destination address for inbound packets * @c: Execution context * @src: Source address * * Return: pointer to IPv6 address */ const struct in6_addr *tap_ip6_daddr(const struct ctx *c, const struct in6_addr *src) { if (IN6_IS_ADDR_LINKLOCAL(src)) return &c->ip6.addr_ll_seen; return &c->ip6.addr_seen; } /** * tap_push_l2h() - Build an L2 header for an inbound packet * @c: Execution context * @buf: Buffer address at which to generate header * @proto: Ethernet protocol number for L3 * * Return: pointer at which to write the packet's payload */ static void *tap_push_l2h(const struct ctx *c, void *buf, uint16_t proto) { struct ethhdr *eh = (struct ethhdr *)buf; /* TODO: ARP table lookup */ memcpy(eh->h_dest, c->guest_mac, ETH_ALEN); memcpy(eh->h_source, c->our_tap_mac, ETH_ALEN); eh->h_proto = ntohs(proto); return eh + 1; } /** * tap_push_ip4h() - Build IPv4 header for inbound packet, with checksum * @c: Execution context * @src: IPv4 source address * @dst: IPv4 destination address * @l4len: IPv4 payload length * @proto: L4 protocol number * * Return: pointer at which to write the packet's payload */ static void *tap_push_ip4h(struct iphdr *ip4h, struct in_addr src, struct in_addr dst, size_t l4len, uint8_t proto) { uint16_t l3len = l4len + sizeof(*ip4h); ip4h->version = 4; ip4h->ihl = sizeof(struct iphdr) / 4; ip4h->tos = 0; ip4h->tot_len = htons(l3len); ip4h->id = 0; ip4h->frag_off = 0; ip4h->ttl = 255; ip4h->protocol = proto; ip4h->saddr = src.s_addr; ip4h->daddr = dst.s_addr; ip4h->check = csum_ip4_header(l3len, proto, src, dst); return ip4h + 1; } /** * tap_udp4_send() - Send UDP over IPv4 packet * @c: Execution context * @src: IPv4 source address * @sport: UDP source port * @dst: IPv4 destination address * @dport: UDP destination port * @in: UDP payload contents (not including UDP header) * @dlen: UDP payload length (not including UDP header) */ void tap_udp4_send(const struct ctx *c, struct in_addr src, in_port_t sport, struct in_addr dst, in_port_t dport, const void *in, size_t dlen) { size_t l4len = dlen + sizeof(struct udphdr); char buf[USHRT_MAX]; struct iphdr *ip4h = tap_push_l2h(c, buf, ETH_P_IP); struct udphdr *uh = tap_push_ip4h(ip4h, src, dst, l4len, IPPROTO_UDP); char *data = (char *)(uh + 1); uh->source = htons(sport); uh->dest = htons(dport); uh->len = htons(l4len); csum_udp4(uh, src, dst, in, dlen); memcpy(data, in, dlen); tap_send_single(c, buf, dlen + (data - buf)); } /** * tap_icmp4_send() - Send ICMPv4 packet * @c: Execution context * @src: IPv4 source address * @dst: IPv4 destination address * @in: ICMP packet, including ICMP header * @l4len: ICMP packet length, including ICMP header */ void tap_icmp4_send(const struct ctx *c, struct in_addr src, struct in_addr dst, const void *in, size_t l4len) { char buf[USHRT_MAX]; struct iphdr *ip4h = tap_push_l2h(c, buf, ETH_P_IP); struct icmphdr *icmp4h = tap_push_ip4h(ip4h, src, dst, l4len, IPPROTO_ICMP); memcpy(icmp4h, in, l4len); csum_icmp4(icmp4h, icmp4h + 1, l4len - sizeof(*icmp4h)); tap_send_single(c, buf, l4len + ((char *)icmp4h - buf)); } /** * tap_push_ip6h() - Build IPv6 header for inbound packet * @c: Execution context * @src: IPv6 source address * @dst: IPv6 destination address * @l4len: L4 payload length * @proto: L4 protocol number * @flow: IPv6 flow identifier * * Return: pointer at which to write the packet's payload */ static void *tap_push_ip6h(struct ipv6hdr *ip6h, const struct in6_addr *src, const struct in6_addr *dst, size_t l4len, uint8_t proto, uint32_t flow) { ip6h->payload_len = htons(l4len); ip6h->priority = 0; ip6h->version = 6; ip6h->nexthdr = proto; ip6h->hop_limit = 255; ip6h->saddr = *src; ip6h->daddr = *dst; ip6h->flow_lbl[0] = (flow >> 16) & 0xf; ip6h->flow_lbl[1] = (flow >> 8) & 0xff; ip6h->flow_lbl[2] = (flow >> 0) & 0xff; return ip6h + 1; } /** * tap_udp6_send() - Send UDP over IPv6 packet * @c: Execution context * @src: IPv6 source address * @sport: UDP source port * @dst: IPv6 destination address * @dport: UDP destination port * @flow: Flow label * @in: UDP payload contents (not including UDP header) * @dlen: UDP payload length (not including UDP header) */ void tap_udp6_send(const struct ctx *c, const struct in6_addr *src, in_port_t sport, const struct in6_addr *dst, in_port_t dport, uint32_t flow, const void *in, size_t dlen) { size_t l4len = dlen + sizeof(struct udphdr); char buf[USHRT_MAX]; struct ipv6hdr *ip6h = tap_push_l2h(c, buf, ETH_P_IPV6); struct udphdr *uh = tap_push_ip6h(ip6h, src, dst, l4len, IPPROTO_UDP, flow); char *data = (char *)(uh + 1); uh->source = htons(sport); uh->dest = htons(dport); uh->len = htons(l4len); csum_udp6(uh, src, dst, in, dlen); memcpy(data, in, dlen); tap_send_single(c, buf, dlen + (data - buf)); } /** * tap_icmp6_send() - Send ICMPv6 packet * @c: Execution context * @src: IPv6 source address * @dst: IPv6 destination address * @in: ICMP packet, including ICMP header * @l4len: ICMP packet length, including ICMP header */ void tap_icmp6_send(const struct ctx *c, const struct in6_addr *src, const struct in6_addr *dst, const void *in, size_t l4len) { char buf[USHRT_MAX]; struct ipv6hdr *ip6h = tap_push_l2h(c, buf, ETH_P_IPV6); struct icmp6hdr *icmp6h = tap_push_ip6h(ip6h, src, dst, l4len, IPPROTO_ICMPV6, 0); memcpy(icmp6h, in, l4len); csum_icmp6(icmp6h, src, dst, icmp6h + 1, l4len - sizeof(*icmp6h)); tap_send_single(c, buf, l4len + ((char *)icmp6h - buf)); } /** * tap_send_frames_pasta() - Send multiple frames to the pasta tap * @c: Execution context * @iov: Array of buffers * @bufs_per_frame: Number of buffers (iovec entries) per frame * @nframes: Number of frames to send * * @iov must have total length @bufs_per_frame * @nframes, with each set of * @bufs_per_frame contiguous buffers representing a single frame. * * Return: number of frames successfully sent * * #syscalls:pasta write */ static size_t tap_send_frames_pasta(const struct ctx *c, const struct iovec *iov, size_t bufs_per_frame, size_t nframes) { size_t nbufs = bufs_per_frame * nframes; size_t i; for (i = 0; i < nbufs; i += bufs_per_frame) { ssize_t rc = writev(c->fd_tap, iov + i, bufs_per_frame); size_t framelen = iov_size(iov + i, bufs_per_frame); if (rc < 0) { debug_perror("tap write"); switch (errno) { case EAGAIN: #if EAGAIN != EWOULDBLOCK case EWOULDBLOCK: #endif case EINTR: case ENOBUFS: case ENOSPC: case EIO: /* interface down? */ break; default: die("Write error on tap device, exiting"); } } else if ((size_t)rc < framelen) { debug("short write on tuntap: %zd/%zu", rc, framelen); break; } } return i / bufs_per_frame; } /** * tap_send_frames_passt() - Send multiple frames to the passt tap * @c: Execution context * @iov: Array of buffers, each containing one frame * @bufs_per_frame: Number of buffers (iovec entries) per frame * @nframes: Number of frames to send * * @iov must have total length @bufs_per_frame * @nframes, with each set of * @bufs_per_frame contiguous buffers representing a single frame. * * Return: number of frames successfully sent * * #syscalls:passt sendmsg */ static size_t tap_send_frames_passt(const struct ctx *c, const struct iovec *iov, size_t bufs_per_frame, size_t nframes) { size_t nbufs = bufs_per_frame * nframes; struct msghdr mh = { .msg_iov = (void *)iov, .msg_iovlen = nbufs, }; size_t buf_offset; unsigned int i; ssize_t sent; sent = sendmsg(c->fd_tap, &mh, MSG_NOSIGNAL | MSG_DONTWAIT); if (sent < 0) return 0; /* Check for any partial frames due to short send */ i = iov_skip_bytes(iov, nbufs, sent, &buf_offset); if (i < nbufs && (buf_offset || (i % bufs_per_frame))) { /* Number of unsent or partially sent buffers for the frame */ size_t rembufs = bufs_per_frame - (i % bufs_per_frame); if (write_remainder(c->fd_tap, &iov[i], rembufs, buf_offset) < 0) { err_perror("tap: partial frame send"); return i; } i += rembufs; } return i / bufs_per_frame; } /** * tap_send_frames() - Send out multiple prepared frames * @c: Execution context * @iov: Array of buffers, each containing one frame (with L2 headers) * @bufs_per_frame: Number of buffers (iovec entries) per frame * @nframes: Number of frames to send * * @iov must have total length @bufs_per_frame * @nframes, with each set of * @bufs_per_frame contiguous buffers representing a single frame. * * Return: number of frames actually sent */ size_t tap_send_frames(const struct ctx *c, const struct iovec *iov, size_t bufs_per_frame, size_t nframes) { size_t m; if (!nframes) return 0; if (c->mode == MODE_PASTA) m = tap_send_frames_pasta(c, iov, bufs_per_frame, nframes); else m = tap_send_frames_passt(c, iov, bufs_per_frame, nframes); if (m < nframes) { tap_full_flag = true; debug("tap: failed to send %zu frames of %zu", nframes - m, nframes); } pcap_multiple(iov, bufs_per_frame, m, c->mode == MODE_PASST ? sizeof(uint32_t) : 0); return m; } /** * eth_update_mac() - Update tap L2 header with new Ethernet addresses * @eh: Ethernet headers to update * @eth_d: Ethernet destination address, NULL if unchanged * @eth_s: Ethernet source address, NULL if unchanged */ void eth_update_mac(struct ethhdr *eh, const unsigned char *eth_d, const unsigned char *eth_s) { if (eth_d) memcpy(eh->h_dest, eth_d, sizeof(eh->h_dest)); if (eth_s) memcpy(eh->h_source, eth_s, sizeof(eh->h_source)); } PACKET_POOL_DECL(pool_l4, UIO_MAXIOV, pkt_buf); /** * struct l4_seq4_t - Message sequence for one protocol handler call, IPv4 * @msgs: Count of messages in sequence * @protocol: Protocol number * @source: Source port * @dest: Destination port * @saddr: Source address * @daddr: Destination address * @msg: Array of messages that can be handled in a single call */ static struct tap4_l4_t { uint8_t protocol; uint16_t source; uint16_t dest; struct in_addr saddr; struct in_addr daddr; struct pool_l4_t p; } tap4_l4[TAP_SEQS /* Arbitrary: TAP_MSGS in theory, so limit in users */]; /** * struct l4_seq6_t - Message sequence for one protocol handler call, IPv6 * @msgs: Count of messages in sequence * @protocol: Protocol number * @source: Source port * @dest: Destination port * @saddr: Source address * @daddr: Destination address * @msg: Array of messages that can be handled in a single call */ static struct tap6_l4_t { uint8_t protocol; uint16_t source; uint16_t dest; struct in6_addr saddr; struct in6_addr daddr; struct pool_l4_t p; } tap6_l4[TAP_SEQS /* Arbitrary: TAP_MSGS in theory, so limit in users */]; /** * tap_packet_debug() - Print debug message for packet(s) from guest/tap * @iph: IPv4 header, can be NULL * @ip6h: IPv6 header, can be NULL * @seq4: Pointer to @struct tap_l4_seq4, can be NULL * @proto6: IPv6 protocol, for IPv6 * @seq6: Pointer to @struct tap_l4_seq6, can be NULL * @count: Count of packets in this sequence */ static void tap_packet_debug(const struct iphdr *iph, const struct ipv6hdr *ip6h, const struct tap4_l4_t *seq4, uint8_t proto6, const struct tap6_l4_t *seq6, int count) { char buf6s[INET6_ADDRSTRLEN], buf6d[INET6_ADDRSTRLEN]; char buf4s[INET_ADDRSTRLEN], buf4d[INET_ADDRSTRLEN]; uint8_t proto = 0; if (iph || seq4) { if (iph) { inet_ntop(AF_INET, &iph->saddr, buf4s, sizeof(buf4s)); inet_ntop(AF_INET, &iph->daddr, buf4d, sizeof(buf4d)); proto = iph->protocol; } else { inet_ntop(AF_INET, &seq4->saddr, buf4s, sizeof(buf4s)); inet_ntop(AF_INET, &seq4->daddr, buf4d, sizeof(buf4d)); proto = seq4->protocol; } } else { inet_ntop(AF_INET6, ip6h ? &ip6h->saddr : &seq6->saddr, buf6s, sizeof(buf6s)); inet_ntop(AF_INET6, ip6h ? &ip6h->daddr : &seq6->daddr, buf6d, sizeof(buf6d)); proto = proto6; } if (proto == IPPROTO_TCP || proto == IPPROTO_UDP) { trace("tap: protocol %i, %s%s%s:%i -> %s%s%s:%i (%i packet%s)", proto, seq4 ? "" : "[", seq4 ? buf4s : buf6s, seq4 ? "" : "]", ntohs(seq4 ? seq4->source : seq6->source), seq4 ? "" : "[", seq4 ? buf4d : buf6d, seq4 ? "" : "]", ntohs(seq4 ? seq4->dest : seq6->dest), count, count == 1 ? "" : "s"); } else { trace("tap: protocol %i, %s -> %s (%i packet%s)", proto, iph ? buf4s : buf6s, iph ? buf4d : buf6d, count, count == 1 ? "" : "s"); } } /** * tap4_is_fragment() - Determine if a packet is an IP fragment * @iph: IPv4 header (length already validated) * @now: Current timestamp * * Return: true if iph is an IP fragment, false otherwise */ static bool tap4_is_fragment(const struct iphdr *iph, const struct timespec *now) { if (ntohs(iph->frag_off) & ~IP_DF) { /* Ratelimit messages */ static time_t last_message; static unsigned num_dropped; num_dropped++; if (now->tv_sec - last_message > FRAGMENT_MSG_RATE) { warn("Can't process IPv4 fragments (%u dropped)", num_dropped); last_message = now->tv_sec; num_dropped = 0; } return true; } return false; } /** * tap4_handler() - IPv4 and ARP packet handler for tap file descriptor * @c: Execution context * @in: Ingress packet pool, packets with Ethernet headers * @now: Current timestamp * * Return: count of packets consumed by handlers */ static int tap4_handler(struct ctx *c, const struct pool *in, const struct timespec *now) { unsigned int i, j, seq_count; struct tap4_l4_t *seq; if (!c->ifi4 || !in->count) return in->count; i = 0; resume: for (seq_count = 0, seq = NULL; i < in->count; i++) { size_t l2len, l3len, hlen, l4len; const struct ethhdr *eh; const struct udphdr *uh; struct iphdr *iph; const char *l4h; packet_get(in, i, 0, 0, &l2len); eh = packet_get(in, i, 0, sizeof(*eh), &l3len); if (!eh) continue; if (ntohs(eh->h_proto) == ETH_P_ARP) { PACKET_POOL_P(pkt, 1, in->buf, in->buf_size); packet_add(pkt, l2len, (char *)eh); arp(c, pkt); continue; } iph = packet_get(in, i, sizeof(*eh), sizeof(*iph), NULL); if (!iph) continue; hlen = iph->ihl * 4UL; if (hlen < sizeof(*iph) || htons(iph->tot_len) > l3len || hlen > l3len) continue; /* We don't handle IP fragments, drop them */ if (tap4_is_fragment(iph, now)) continue; l4len = htons(iph->tot_len) - hlen; if (IN4_IS_ADDR_LOOPBACK(&iph->saddr) || IN4_IS_ADDR_LOOPBACK(&iph->daddr)) { char sstr[INET_ADDRSTRLEN], dstr[INET_ADDRSTRLEN]; debug("Loopback address on tap interface: %s -> %s", inet_ntop(AF_INET, &iph->saddr, sstr, sizeof(sstr)), inet_ntop(AF_INET, &iph->daddr, dstr, sizeof(dstr))); continue; } if (iph->saddr && c->ip4.addr_seen.s_addr != iph->saddr) c->ip4.addr_seen.s_addr = iph->saddr; l4h = packet_get(in, i, sizeof(*eh) + hlen, l4len, NULL); if (!l4h) continue; if (iph->protocol == IPPROTO_ICMP) { PACKET_POOL_P(pkt, 1, in->buf, in->buf_size); if (c->no_icmp) continue; tap_packet_debug(iph, NULL, NULL, 0, NULL, 1); packet_add(pkt, l4len, l4h); icmp_tap_handler(c, PIF_TAP, AF_INET, &iph->saddr, &iph->daddr, pkt, now); continue; } uh = packet_get(in, i, sizeof(*eh) + hlen, sizeof(*uh), NULL); if (!uh) continue; if (iph->protocol == IPPROTO_UDP) { PACKET_POOL_P(pkt, 1, in->buf, in->buf_size); packet_add(pkt, l2len, (char *)eh); if (dhcp(c, pkt)) continue; } if (iph->protocol != IPPROTO_TCP && iph->protocol != IPPROTO_UDP) { tap_packet_debug(iph, NULL, NULL, 0, NULL, 1); continue; } #define L4_MATCH(iph, uh, seq) \ ((seq)->protocol == (iph)->protocol && \ (seq)->source == (uh)->source && (seq)->dest == (uh)->dest && \ (seq)->saddr.s_addr == (iph)->saddr && (seq)->daddr.s_addr == (iph)->daddr) #define L4_SET(iph, uh, seq) \ do { \ (seq)->protocol = (iph)->protocol; \ (seq)->source = (uh)->source; \ (seq)->dest = (uh)->dest; \ (seq)->saddr.s_addr = (iph)->saddr; \ (seq)->daddr.s_addr = (iph)->daddr; \ } while (0) if (seq && L4_MATCH(iph, uh, seq) && seq->p.count < UIO_MAXIOV) goto append; if (seq_count == TAP_SEQS) break; /* Resume after flushing if i < in->count */ for (seq = tap4_l4 + seq_count - 1; seq >= tap4_l4; seq--) { if (L4_MATCH(iph, uh, seq)) { if (seq->p.count >= UIO_MAXIOV) seq = NULL; break; } } if (!seq || seq < tap4_l4) { seq = tap4_l4 + seq_count++; L4_SET(iph, uh, seq); pool_flush((struct pool *)&seq->p); } #undef L4_MATCH #undef L4_SET append: packet_add((struct pool *)&seq->p, l4len, l4h); } for (j = 0, seq = tap4_l4; j < seq_count; j++, seq++) { const struct pool *p = (const struct pool *)&seq->p; size_t k; tap_packet_debug(NULL, NULL, seq, 0, NULL, p->count); if (seq->protocol == IPPROTO_TCP) { if (c->no_tcp) continue; for (k = 0; k < p->count; ) k += tcp_tap_handler(c, PIF_TAP, AF_INET, &seq->saddr, &seq->daddr, p, k, now); } else if (seq->protocol == IPPROTO_UDP) { if (c->no_udp) continue; for (k = 0; k < p->count; ) k += udp_tap_handler(c, PIF_TAP, AF_INET, &seq->saddr, &seq->daddr, p, k, now); } } if (i < in->count) goto resume; return in->count; } /** * tap6_handler() - IPv6 packet handler for tap file descriptor * @c: Execution context * @in: Ingress packet pool, packets with Ethernet headers * @now: Current timestamp * * Return: count of packets consumed by handlers */ static int tap6_handler(struct ctx *c, const struct pool *in, const struct timespec *now) { unsigned int i, j, seq_count = 0; struct tap6_l4_t *seq; if (!c->ifi6 || !in->count) return in->count; i = 0; resume: for (seq_count = 0, seq = NULL; i < in->count; i++) { size_t l4len, plen, check; struct in6_addr *saddr, *daddr; const struct ethhdr *eh; const struct udphdr *uh; struct ipv6hdr *ip6h; uint8_t proto; char *l4h; eh = packet_get(in, i, 0, sizeof(*eh), NULL); if (!eh) continue; ip6h = packet_get(in, i, sizeof(*eh), sizeof(*ip6h), &check); if (!ip6h) continue; saddr = &ip6h->saddr; daddr = &ip6h->daddr; plen = ntohs(ip6h->payload_len); if (plen != check) continue; if (!(l4h = ipv6_l4hdr(in, i, sizeof(*eh), &proto, &l4len))) continue; if (IN6_IS_ADDR_LOOPBACK(saddr) || IN6_IS_ADDR_LOOPBACK(daddr)) { char sstr[INET6_ADDRSTRLEN], dstr[INET6_ADDRSTRLEN]; debug("Loopback address on tap interface: %s -> %s", inet_ntop(AF_INET6, saddr, sstr, sizeof(sstr)), inet_ntop(AF_INET6, daddr, dstr, sizeof(dstr))); continue; } if (IN6_IS_ADDR_LINKLOCAL(saddr)) { c->ip6.addr_ll_seen = *saddr; if (IN6_IS_ADDR_UNSPECIFIED(&c->ip6.addr_seen)) { c->ip6.addr_seen = *saddr; } } else if (!IN6_IS_ADDR_UNSPECIFIED(saddr)){ c->ip6.addr_seen = *saddr; } if (proto == IPPROTO_ICMPV6) { PACKET_POOL_P(pkt, 1, in->buf, in->buf_size); if (c->no_icmp) continue; if (l4len < sizeof(struct icmp6hdr)) continue; packet_add(pkt, l4len, l4h); if (ndp(c, (struct icmp6hdr *)l4h, saddr, pkt)) continue; tap_packet_debug(NULL, ip6h, NULL, proto, NULL, 1); icmp_tap_handler(c, PIF_TAP, AF_INET6, saddr, daddr, pkt, now); continue; } if (l4len < sizeof(*uh)) continue; uh = (struct udphdr *)l4h; if (proto == IPPROTO_UDP) { PACKET_POOL_P(pkt, 1, in->buf, in->buf_size); packet_add(pkt, l4len, l4h); if (dhcpv6(c, pkt, saddr, daddr)) continue; } if (proto != IPPROTO_TCP && proto != IPPROTO_UDP) { tap_packet_debug(NULL, ip6h, NULL, proto, NULL, 1); continue; } #define L4_MATCH(ip6h, proto, uh, seq) \ ((seq)->protocol == (proto) && \ (seq)->source == (uh)->source && \ (seq)->dest == (uh)->dest && \ IN6_ARE_ADDR_EQUAL(&(seq)->saddr, saddr) && \ IN6_ARE_ADDR_EQUAL(&(seq)->daddr, daddr)) #define L4_SET(ip6h, proto, uh, seq) \ do { \ (seq)->protocol = (proto); \ (seq)->source = (uh)->source; \ (seq)->dest = (uh)->dest; \ (seq)->saddr = *saddr; \ (seq)->daddr = *daddr; \ } while (0) if (seq && L4_MATCH(ip6h, proto, uh, seq) && seq->p.count < UIO_MAXIOV) goto append; if (seq_count == TAP_SEQS) break; /* Resume after flushing if i < in->count */ for (seq = tap6_l4 + seq_count - 1; seq >= tap6_l4; seq--) { if (L4_MATCH(ip6h, proto, uh, seq)) { if (seq->p.count >= UIO_MAXIOV) seq = NULL; break; } } if (!seq || seq < tap6_l4) { seq = tap6_l4 + seq_count++; L4_SET(ip6h, proto, uh, seq); pool_flush((struct pool *)&seq->p); } #undef L4_MATCH #undef L4_SET append: packet_add((struct pool *)&seq->p, l4len, l4h); } for (j = 0, seq = tap6_l4; j < seq_count; j++, seq++) { const struct pool *p = (const struct pool *)&seq->p; size_t k; tap_packet_debug(NULL, NULL, NULL, seq->protocol, seq, p->count); if (seq->protocol == IPPROTO_TCP) { if (c->no_tcp) continue; for (k = 0; k < p->count; ) k += tcp_tap_handler(c, PIF_TAP, AF_INET6, &seq->saddr, &seq->daddr, p, k, now); } else if (seq->protocol == IPPROTO_UDP) { if (c->no_udp) continue; for (k = 0; k < p->count; ) k += udp_tap_handler(c, PIF_TAP, AF_INET6, &seq->saddr, &seq->daddr, p, k, now); } } if (i < in->count) goto resume; return in->count; } /** * tap_flush_pools() - Flush both IPv4 and IPv6 packet pools */ void tap_flush_pools(void) { pool_flush(pool_tap4); pool_flush(pool_tap6); } /** * tap_handler() - IPv4/IPv6 and ARP packet handler for tap file descriptor * @c: Execution context * @now: Current timestamp */ void tap_handler(struct ctx *c, const struct timespec *now) { tap4_handler(c, pool_tap4, now); tap6_handler(c, pool_tap6, now); } /** * tap_add_packet() - Queue/capture packet, update notion of guest MAC address * @c: Execution context * @l2len: Total L2 packet length * @p: Packet buffer */ void tap_add_packet(struct ctx *c, ssize_t l2len, char *p) { const struct ethhdr *eh; pcap(p, l2len); eh = (struct ethhdr *)p; if (memcmp(c->guest_mac, eh->h_source, ETH_ALEN)) { memcpy(c->guest_mac, eh->h_source, ETH_ALEN); proto_update_l2_buf(c->guest_mac, NULL); } switch (ntohs(eh->h_proto)) { case ETH_P_ARP: case ETH_P_IP: packet_add(pool_tap4, l2len, p); break; case ETH_P_IPV6: packet_add(pool_tap6, l2len, p); break; default: break; } } /** * tap_sock_reset() - Handle closing or failure of connect AF_UNIX socket * @c: Execution context */ static void tap_sock_reset(struct ctx *c) { info("Client connection closed%s", c->one_off ? ", exiting" : ""); if (c->one_off) exit(EXIT_SUCCESS); /* Close the connected socket, wait for a new connection */ epoll_ctl(c->epollfd, EPOLL_CTL_DEL, c->fd_tap, NULL); close(c->fd_tap); c->fd_tap = -1; } /** * tap_passt_input() - Handler for new data on the socket to qemu * @c: Execution context * @now: Current timestamp * * Return: true if there may be additional data to read, false otherwise */ static bool tap_passt_input(struct ctx *c, const struct timespec *now) { static const char *partial_frame; static ssize_t partial_len = 0; ssize_t n; char *p; tap_flush_pools(); if (partial_len) { /* We have a partial frame from an earlier pass. Move it to the * start of the buffer, top up with new data, then process all * of it. */ memmove(pkt_buf, partial_frame, partial_len); } do { n = recv(c->fd_tap, pkt_buf + partial_len, TAP_BUF_BYTES - partial_len, MSG_DONTWAIT); } while ((n < 0) && errno == EINTR); if (n < 0) { if (errno != EAGAIN && errno != EWOULDBLOCK) { err_perror("Receive error on guest connection, reset"); tap_sock_reset(c); } return false; } p = pkt_buf; n += partial_len; while (n >= (ssize_t)sizeof(uint32_t)) { uint32_t l2len = ntohl_unaligned(p); if (l2len < sizeof(struct ethhdr) || l2len > ETH_MAX_MTU) { err("Bad frame size from guest, resetting connection"); tap_sock_reset(c); return false; } if (l2len + sizeof(uint32_t) > (size_t)n) /* Leave this incomplete frame for later */ break; p += sizeof(uint32_t); n -= sizeof(uint32_t); tap_add_packet(c, l2len, p); p += l2len; n -= l2len; } partial_len = n; partial_frame = p; tap_handler(c, now); return true; } /** * tap_handler_passt() - Event handler for AF_UNIX file descriptor * @c: Execution context * @events: epoll events * @now: Current timestamp */ void tap_handler_passt(struct ctx *c, uint32_t events, const struct timespec *now) { if (events & (EPOLLRDHUP | EPOLLHUP | EPOLLERR)) { tap_sock_reset(c); return; } if (events & EPOLLIN) { while (tap_passt_input(c, now)) ; } if (events & EPOLLOUT) tap_full_flag = false; } /** * tap_pasta_input() - Handler for new data on the socket to hypervisor * @c: Execution context * @now: Current timestamp * * Return: true if there may be additional data to read, false otherwise */ static bool tap_pasta_input(struct ctx *c, const struct timespec *now) { ssize_t n, len; tap_flush_pools(); for (n = 0; n <= (ssize_t)TAP_BUF_BYTES - ETH_MAX_MTU; n += len) { len = read(c->fd_tap, pkt_buf + n, ETH_MAX_MTU); if (len == 0) { die("EOF on tap device, exiting"); } else if (len < 0) { if (errno == EINTR) { len = 0; continue; } if (errno == EAGAIN && errno == EWOULDBLOCK) break; /* all done for now */ die("Error on tap device, exiting"); } /* Ignore frames of bad length */ if (len < (ssize_t)sizeof(struct ethhdr) || len > (ssize_t)ETH_MAX_MTU) continue; tap_add_packet(c, len, pkt_buf + n); } tap_handler(c, now); return len > 0; } /** * tap_handler_pasta() - Packet handler for /dev/net/tun file descriptor * @c: Execution context * @events: epoll events * @now: Current timestamp */ void tap_handler_pasta(struct ctx *c, uint32_t events, const struct timespec *now) { if (events & (EPOLLRDHUP | EPOLLHUP | EPOLLERR)) die("Disconnect event on /dev/net/tun device, exiting"); if (events & EPOLLIN) { while (tap_pasta_input(c, now)) ; } if (events & EPOLLOUT) tap_full_flag = false; } /** * tap_is_full() - Can we write more to the tap device this cycle? * * Return: true if (last we knew) there's more space in the tap buffers, false * otherwise */ /* cppcheck-suppress unusedFunction */ bool tap_is_full(void) { return tap_full_flag; } /** * tap_sock_unix_open() - Create and bind AF_UNIX socket * @sock_path: Socket path. If empty, set on return (UNIX_SOCK_PATH as prefix) * * Return: socket descriptor on success, won't return on failure */ int tap_sock_unix_open(char *sock_path) { int fd = socket(AF_UNIX, SOCK_STREAM, 0); struct sockaddr_un addr = { .sun_family = AF_UNIX, }; int i; if (fd < 0) die_perror("Failed to open UNIX domain socket"); for (i = 1; i < UNIX_SOCK_MAX; i++) { char *path = addr.sun_path; int ex, ret; if (*sock_path) memcpy(path, sock_path, UNIX_PATH_MAX); else snprintf(path, UNIX_PATH_MAX - 1, UNIX_SOCK_PATH, i); ex = socket(AF_UNIX, SOCK_STREAM | SOCK_NONBLOCK, 0); if (ex < 0) die_perror("Failed to check for UNIX domain conflicts"); ret = connect(ex, (const struct sockaddr *)&addr, sizeof(addr)); if (!ret || (errno != ENOENT && errno != ECONNREFUSED && errno != EACCES)) { if (*sock_path) die("Socket path %s already in use", path); close(ex); continue; } close(ex); unlink(path); ret = bind(fd, (const struct sockaddr *)&addr, sizeof(addr)); if (*sock_path && ret) die_perror("Failed to bind UNIX domain socket"); if (!ret) break; } if (i == UNIX_SOCK_MAX) die_perror("Failed to bind UNIX domain socket"); info("UNIX domain socket bound at %s", addr.sun_path); if (!*sock_path) memcpy(sock_path, addr.sun_path, UNIX_PATH_MAX); return fd; } /** * tap_sock_unix_init() - Start listening for connections on AF_UNIX socket * @c: Execution context */ static void tap_sock_unix_init(struct ctx *c) { union epoll_ref ref = { .type = EPOLL_TYPE_TAP_LISTEN }; struct epoll_event ev = { 0 }; listen(c->fd_tap_listen, 0); ref.fd = c->fd_tap_listen; ev.events = EPOLLIN | EPOLLET; ev.data.u64 = ref.u64; epoll_ctl(c->epollfd, EPOLL_CTL_ADD, c->fd_tap_listen, &ev); info("\nYou can now start qemu (>= 7.2, with commit 13c6be96618c):"); info(" kvm ... -device virtio-net-pci,netdev=s -netdev stream,id=s,server=off,addr.type=unix,addr.path=%s", c->sock_path); info("or qrap, for earlier qemu versions:"); info(" ./qrap 5 kvm ... -net socket,fd=5 -net nic,model=virtio"); } /** * tap_listen_handler() - Handle new connection on listening socket * @c: Execution context * @events: epoll events */ void tap_listen_handler(struct ctx *c, uint32_t events) { union epoll_ref ref = { .type = EPOLL_TYPE_TAP_PASST }; struct epoll_event ev = { 0 }; int v = INT_MAX / 2; struct ucred ucred; socklen_t len; if (events != EPOLLIN) die("Error on listening Unix socket, exiting"); len = sizeof(ucred); /* Another client is already connected: accept and close right away. */ if (c->fd_tap != -1) { int discard = accept4(c->fd_tap_listen, NULL, NULL, SOCK_NONBLOCK); if (discard == -1) return; if (!getsockopt(discard, SOL_SOCKET, SO_PEERCRED, &ucred, &len)) info("discarding connection from PID %i", ucred.pid); close(discard); return; } c->fd_tap = accept4(c->fd_tap_listen, NULL, NULL, 0); if (!getsockopt(c->fd_tap, SOL_SOCKET, SO_PEERCRED, &ucred, &len)) info("accepted connection from PID %i", ucred.pid); if (!c->low_rmem && setsockopt(c->fd_tap, SOL_SOCKET, SO_RCVBUF, &v, sizeof(v))) trace("tap: failed to set SO_RCVBUF to %i", v); if (!c->low_wmem && setsockopt(c->fd_tap, SOL_SOCKET, SO_SNDBUF, &v, sizeof(v))) trace("tap: failed to set SO_SNDBUF to %i", v); ref.fd = c->fd_tap; ev.events = EPOLLIN | EPOLLOUT | EPOLLRDHUP | EPOLLET; ev.data.u64 = ref.u64; epoll_ctl(c->epollfd, EPOLL_CTL_ADD, c->fd_tap, &ev); } /** * tap_ns_tun() - Get tuntap fd in namespace * @c: Execution context * * Return: 0 on success, exits on failure * * #syscalls:pasta ioctl openat */ static int tap_ns_tun(void *arg) { struct ifreq ifr = { .ifr_flags = IFF_TAP | IFF_NO_PI }; int flags = O_RDWR | O_NONBLOCK | O_CLOEXEC; struct ctx *c = (struct ctx *)arg; int fd, rc; c->fd_tap = -1; memcpy(ifr.ifr_name, c->pasta_ifn, IFNAMSIZ); ns_enter(c); fd = open("/dev/net/tun", flags); if (fd < 0) die_perror("Failed to open() /dev/net/tun"); rc = ioctl(fd, TUNSETIFF, &ifr); if (rc < 0) die_perror("TUNSETIFF ioctl on /dev/net/tun failed"); if (!(c->pasta_ifi = if_nametoindex(c->pasta_ifn))) die("Tap device opened but no network interface found"); c->fd_tap = fd; return 0; } /** * tap_sock_tun_init() - Set up /dev/net/tun file descriptor * @c: Execution context */ static void tap_sock_tun_init(struct ctx *c) { union epoll_ref ref = { .type = EPOLL_TYPE_TAP_PASTA }; struct epoll_event ev = { 0 }; NS_CALL(tap_ns_tun, c); if (c->fd_tap == -1) die("Failed to set up tap device in namespace"); pasta_ns_conf(c); ref.fd = c->fd_tap; ev.events = EPOLLIN | EPOLLOUT | EPOLLRDHUP | EPOLLET; ev.data.u64 = ref.u64; epoll_ctl(c->epollfd, EPOLL_CTL_ADD, c->fd_tap, &ev); } /** * tap_sock_init() - Create and set up AF_UNIX socket or tuntap file descriptor * @c: Execution context */ void tap_sock_init(struct ctx *c) { size_t sz = sizeof(pkt_buf); int i; pool_tap4_storage = PACKET_INIT(pool_tap4, TAP_MSGS, pkt_buf, sz); pool_tap6_storage = PACKET_INIT(pool_tap6, TAP_MSGS, pkt_buf, sz); for (i = 0; i < TAP_SEQS; i++) { tap4_l4[i].p = PACKET_INIT(pool_l4, UIO_MAXIOV, pkt_buf, sz); tap6_l4[i].p = PACKET_INIT(pool_l4, UIO_MAXIOV, pkt_buf, sz); } if (c->fd_tap != -1) { /* Passed as --fd */ struct epoll_event ev = { 0 }; union epoll_ref ref; ASSERT(c->one_off); ref.fd = c->fd_tap; if (c->mode == MODE_PASST) ref.type = EPOLL_TYPE_TAP_PASST; else ref.type = EPOLL_TYPE_TAP_PASTA; ev.events = EPOLLIN | EPOLLOUT | EPOLLRDHUP | EPOLLET; ev.data.u64 = ref.u64; epoll_ctl(c->epollfd, EPOLL_CTL_ADD, c->fd_tap, &ev); return; } if (c->mode == MODE_PASTA) { tap_sock_tun_init(c); } else { tap_sock_unix_init(c); /* In passt mode, we don't know the guest's MAC address until it * sends us packets. Use the broadcast address so that our * first packets will reach it. */ memset(&c->guest_mac, 0xff, sizeof(c->guest_mac)); } }